-
-
Notifications
You must be signed in to change notification settings - Fork 363
Expand file tree
/
Copy pathbearer.config.js
More file actions
63 lines (53 loc) · 1.74 KB
/
bearer.config.js
File metadata and controls
63 lines (53 loc) · 1.74 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
import errors from '../controllers/errors.js';
import jwt from '../helpers/jwt.helper.js';
import loggerHelper from '../helpers/logger.helper.js';
const logger = loggerHelper.get('config/bearer.config.js');
/**
* Extracts the bearer token from the auth header
* Returns null if there is not a valid bearer token
* @param {String} authHeader
* @returns {String|null}
*/
const getBearerToken = (authHeader) => {
if (!authHeader) {
logger.info('Bearer token not found, auth header is empty');
return null;
}
if (authHeader.indexOf('Bearer ') === -1) {
logger.warn('Bearer token key word not found in auth header');
return null;
}
return authHeader.split(' ')[1];
};
const middleware = (req, res, next) => {
const token = getBearerToken(req.headers.authorization);
if (!token) {
logger.warn(`Bearer token not found for resource that requires authentication: ${req.url}`);
return errors.unauthorized(res, logger);
}
try {
const { provider, user } = jwt.verifyToken(token);
req.provider = provider;
req.user = user;
return next();
} catch (e) {
if (e.name === 'TokenExpiredError') {
logger.audit('Expired JWT encountered');
return errors.unauthorized(res, logger);
}
logger.audit('Error decoding JWT');
logger.error(e);
return errors.badRequest('Invalid JWT', res, logger);
}
};
const adminMiddleware = (req, res, next) => {
if (!req.user?.isAdmin) {
logger.warn(`User ${req.user?.id} attempted to access admin resource ${req.url}`);
return errors.forbidden(res, logger);
}
return next();
};
export default {
middleware,
adminMiddleware
};